[HTML][HTML] Edge computing for iot-enabled smart grid: The future of energy

QN Minh, VH Nguyen, VK Quy, LA Ngoc, A Chehri… - Energies, 2022 - mdpi.com
The explosive development of electrical engineering in the early 19th century marked the
birth of the 2nd industrial revolution, with the use of electrical energy in place of steam …

Synchronization of chaotic artificial neurons and its application to secure image transmission under MQTT for IoT protocol

AM González-Zapata, E Tlelo-Cuautle, I Cruz-Vega… - Nonlinear …, 2021 - Springer
Artificial neurons are quite useful to generate chaotic behavior, and they can be
implemented on embedded systems like Raspberry Pi that include WiFi network …

A zero-trust network-based access control scheme for sustainable and resilient industry 5.0

KA Abuhasel - IEEE Access, 2023 - ieeexplore.ieee.org
This new era of the industry is characterized by the integration of artificial intelligence and
the Internet of Things (IoT) to optimize production processes. To ensure sustainability and …

A survey on security requirements, threats and protocols in industrial internet of things

A Karakaya, F Arat - International Journal of Information Security …, 2021 - dergipark.org.tr
With the tremendous success and prevalence of the Internet of Things (IoT) consumer
technologies are shifted to distinct areas. Therefore, the IoT paradigm is evoluting with …

[HTML][HTML] Rampant Smoothing (RTS) Algorithm: an optimized consensus mechanism for private Blockchain enabled technologies

U Tariq - EURASIP Journal on Wireless Communications and …, 2022 - Springer
Blockchain is a distributed database method of storing electronic information in digital form
that makes it challenging to transform, hack, or rogue the system. Each time a new operation …

[HTML][HTML] Zero-Tolerance Security Paradigm for Enterprise-Specific Industrial Internet of Things

U Tariq - Electronics, 2022 - mdpi.com
The complex industrial environment of the 21st century is equipped with the Internet of
Things platform, with the objective of real-time operational visibility, improved device …

Privacy and Security Best Practices for IoT Solutions

M Anedda, A Floris, R Girau, M Fadda, P Ruiu… - IEEE …, 2023 - ieeexplore.ieee.org
The rapid increase in Internet of Things (IoT) applications has raised security and privacy
issues due to the huge amount of data acquired by IoT devices and transmitted through the …

Enhanced health monitoring in IoT with auto-metric graph neural networks and Archimedes optimisation

SS Arumugam, T Sripriya, A Mudassar Ali… - … of Experimental & …, 2024 - Taylor & Francis
IoT-based healthcare monitoring systems often lack context-awareness, hindering their
ability to provide personalised and accurate healthcare services. The proposed architecture …

A pervasive computational intelligence based cognitive security co-design framework for hype-connected embedded industrial IoT

U Tariq, TA Ahanger, M Nusir, A Ibrahim - International Journal of …, 2021 - univagora.ro
The amplified connectivity of routine IoT entities can expose various security trajectories for
cybercriminals to execute malevolent attacks. These dangers are even amplified by the …

Cybersecurity metrics for human-robot collaborative automotive manufacturing

SMM Rahman - … IEEE International Workshop on Metrology for …, 2021 - ieeexplore.ieee.org
A human-robot collaborative system was developed where a human co-worker and a
collaborative robot collaborated to perform assembly tasks. We assumed such assembly …